Project Report on Study of Viruses and Worms

Conclusion and Future work

Virus and worms are very crucial in nature and imposing lot of security threats on the networks and applications these days and there is lot of research done towards this across the literature and there is no perfect solution found till now. The impact of the virus and worms is not at all expected on the overall system performance and application performance and thus impose a new challenge every day towards the security of the network. In general the type of virus and worms can be differentiated against the level of impact shown by them on the overall system security and also the level of damage done to the application and the worms are more dangerous when compared to the virus.

There are different types of worms and they are identified by the simple worm detection systems and in general there are some critical worms that can’t be detected by these detection systems. The level of impact shown by the virus and worms purely depends on their overall operations done towards the system resources and also they can occupy the complete system and application space and thus a perfect detection system is required in this context. In general these virus and worms can replicate themselves and occupy the complete system resources and delete the important operating system files and backup files and thus the overall network and system resources are deleted forever.

There are many antivirus and worm detection software’s and techniques and most of them are proved to be successful in detecting these worms and but most of them are complex in nature at the implementation level. When the impact of C-worms is compared to the traditional worms there are many difference and the key among them is that C-worms generates more traffic on the network and due to this traffic the actual required information is lost due to the highly generated traffic on the network. 

The main aim of this Project Report is to detect and prevent the impact of the C-worms and ensure a maximum security to the system and the complete design followed to achieve the proposed system is given in this project. To develop the proposed system, a java based application is created and evaluated to understand the technical specifications of the algorithm used to detect the C-worms.

Different levels of system scan are provided to the users and the corresponding users can use this application to detect the worms at the complete system level and also individual user defined drives level.  The overall performance of the scan process can be viewed by the users and the list of infected files by the C-worms can also be tracked using the corresponding log files. 

Few metrics are also used in this context to understand the system resources being consumed during the scan process against the CPU performance and thus users can understand the level of technical operations being performed against the worm scan process. When the performance of the worm detection application is evaluated, it is proved that C-worms and the corresponding network traffic generated by them can be detected easily with this application and the detection rate an detection time are also calculated in this application. 

Future work 

A detailed analysis of the C-worm detection system is done in this project and the key development aspects are also discussed and apart from the work done in this context, there is some future work to be done to improve the application in few aspects and they are as listed below 

  • A detailed analysis of different affects shown by the C-worms on the system security can be discussed and evaluated in future at the application level
  • Current algorithm can be extended further to show the end users the actual procedure followed to find out the virus across the user defined directories
  • Overall traffic analysis can be done in a better way to understand the level of impact shown by the C-worms in future
  • A standalone application is created in this project and in future the same can be extended to a distributed network such that the scan progress can be extended to remote systems as well.

Leave a Reply

Your email address will not be published. Required fields are marked *